117
SSH Hardening with ssh-audit (thoughts.greyh.at)
submitted 11 months ago by zquestz@lemm.ee to c/linux@lemmy.ml
all 14 comments
sorted by: hot top controversial new old
[-] taaz@biglemmowski.win 15 points 11 months ago* (last edited 11 months ago)
[-] zquestz@lemm.ee 2 points 11 months ago

Fun, I didn't know about this. =)

[-] RegalPotoo@lemmy.world 7 points 11 months ago

Cool,.but from the post it seems like all it does is:

  • Recommend disabling old algorithms, which you would have already done if you followed a modern hardening guide like https://infosec.mozilla.org/guidelines/openssh
  • Detect if you are running a known-vulnerable version of OpenSSH, which wouldn't be an issue if you keep good patch hygiene and install your SSH server through you operating systems' package manager

So what's the point? Who is this for?

[-] jwhardcastle@dmv.social 14 points 11 months ago

Scripting, to confirm that a large fleet of boxes are all running according to your policy. Verification that the config you want is actually the config you have.

[-] lemann@lemmy.one 3 points 11 months ago

This is exactly what I use it for 👌 very handy for this

[-] iuser@lemmy.world 4 points 11 months ago

Thanks for pushing the awareness.

[-] PureTryOut@lemmy.kde.social 4 points 11 months ago

Personally I made sure SSH is only accessible when connected through a VPN setup for that purpose. As in, that same machine hosts a Wireguard setup (through Tailscale) and you need to connect to that first before SSH is available. And then SSH also only accepts key-based authentication. I don't think I need more than that?

[-] 9488fcea02a9@sh.itjust.works 3 points 11 months ago

What if wireguard has issues? Then you cant ssh in to fix

[-] sturmblast@lemmy.world 2 points 11 months ago

that really just depends on your scenario

[-] PureTryOut@lemmy.kde.social 1 points 10 months ago

I have a VPS that runs the main proxy which I can always access via a console on the website of the company I'm renting it from (Hetzner). The other machines run locally in my home so I can just plug in a cable if need be.

[-] possiblylinux127@lemmy.zip 1 points 11 months ago

Couldn't you just use ssh port forwarding?

[-] ReversalHatchery@beehaw.org 3 points 11 months ago

If they use the VPN for other things too, it's simpler this way

[-] PureTryOut@lemmy.kde.social 1 points 10 months ago

Sure but I rather not have the SSH port open to the world, it just makes it harder for attackers to get in this way. Besides I use the VPN for more things, some self-hosted services I don't want accessible by the whole world.

this post was submitted on 16 Oct 2023
117 points (99.2% liked)

Linux

47210 readers
722 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS